A Distributed Denial of Service (DDoS) attack sees large collections of remotely controlled computers target a specific entry point or service. DDoS attacks can reduce the availability of a service for even some of the larget technological companies on the planet. Recent high-end DDoS attacks see hundred of thousands of botNet infected PCs swamping networks and connections with hundreds of gigabits per second. Network routing, connections and hardware can easily be totally saturated. Higher OSI7 layers, such as the application or presentation layers, suffer hugely against DDoS attacks. That’s not to say layers such as the physical or network can’t be specifically targeted either.

What is a UDP Flood Attack (DoS)

by Paul Joyce

A User Datagram Protocol flood attack is a type of denial of service attack (DoS) which relies on the basis that UDP connections are stateless. We recently discussed about TCP SYN attacks being used to DoS targets; now we’re talking about UDP which doesn’t work on the 3 way handshake of TCP. One benefit of […]

Tags: , , , ,

What is a TCP SYN Flood Attack (DoS)

by Paul Joyce

Today we’re looking at a specific type of DoS attack; the SYN flood denial of service attack. Although this type of attack can just as equally be performed as a DDoS attack, the examples we’ll use are for a standard single-source denial of service. A SYN-flood attack works by consuming resources on the targets machine […]

Tags: , , , ,

Explaining Denial of Service Attacks

by Paul Joyce

Denial of Service attacks (DoS attacks) are rather simplistic in nature and devilishly easy to launch. In their simplest form against a well patched and updated system they don’t usually pose too much of a threat, however like most things they have bigger and more dangerous brothers out there. Sometimes its hard to explain a […]

Tags: , , , , ,

Links and useful footery things…

Copyright © 2017 Paul Joyce. Follow me on Twitter or perhaps Google+